We introduce the RC6 block cipher. RC6 is an evolutionary improvement of RC5, designed to meet the requirements of the Advanced Encryption Standard (AES). Like RC5, RC6 makes essential use of data-dependent rotations. New features of RC6 include the use of four working registers instead of two, and the inclusion of integer multiplication as an additional primitive operation. The use of multiplication greatly increases the diffusion achieved per round, allowing for greater security, fewer rounds, and increased throughput.
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sharing systems in the 1960s. This paper traces the subsequent dvelopment of the idea of a \“security kernel\” and of the mathmtical modeling of security, focusing in particular on the paradigmatic Bell LaPadula model. The paper examines the connections between security and formal , deductiv verification of the properties of computer systems. It goes on to discuss differencs between the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense\‘s Trusted Computer System Evaluation Criteria (the so-called Orange Book), which effectively took its final form in 1983. The paper ends by outlining the fragmentation of computer security since the Orange Book was written.
Will developing intrusion detection capabilities meet the operational, performance, and implementation goals of the US Air Force? To help ensure that they will, the MITRE C2 Protect Mission-Oriented Investigation and Experimentation (MOIE) project is making Air Force goals for intrusion detection available to commercial interests that may develop capabilities. This paper, a first cut at defining goals, capitalizes on customer and corporate experience with intrusion detection tools as well as knowledge of the problem domain. It creates an information base abot intrusion detection, providing a framework for discussing, refining, and enhancing intrusion detection goals.